Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Criminology

Incarcerating Exceptional Pupils: Is There A School-To-Prison Pipeline In Eastern Oklahoma?, Brett Alan Fitzgerald Dec 2014

Incarcerating Exceptional Pupils: Is There A School-To-Prison Pipeline In Eastern Oklahoma?, Brett Alan Fitzgerald

Graduate Theses and Dissertations

The school-to-prison pipeline metaphor represents an educational environment that allows public schools to push many at-risk children out of school and into the juvenile justice system or even worse, the adult criminal justice system (Wald and Losen, 2003; Lynn, 2010; Tuzzolo and Hewitt, 2006). The purpose of this study is to examine whether a school-to-prison pipeline exists in eastern Oklahoma, and if so, to better understand the characteristics of the public schools that may be contributing to it. The school-to-prison pipeline metaphor guided three research questions regarding whether certain public schools in eastern Oklahoma referred greater percentages of their students, …


Paws In Prison: A Second Chance, Tiffany King Aug 2014

Paws In Prison: A Second Chance, Tiffany King

Graduate Theses and Dissertations

The documentary film Paws in Prison: A Second Chance takes an in-depth look at a program that has been incorporated in seven Arkansas prisons since 2011. Select inmates housed in these prisons are chosen to learn how to become dog trainers during their sentences. They spend 24 hours a day with dogs that were rescued from shelters where they may have been euthanized. This project incorporates interviews with inmates in the Paws in Prison program, wardens at the Maximum Security Unit and the Tucker Unit, and volunteers who spend time teaching inmates how to train and socialize their dogs. The …


Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham Aug 2014

Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham

Graduate Theses and Dissertations

Terrorism is among the largest threats to national and international security in today's global community. Acts of terrorism have resulted economic and societal impacts throughout the world. Improvements in technology have increased the capacity of terrorists to maximize the impact of their actions. The increasing influence and prevalence of terrorist activity has demanded research focused on the prevention of terrorist acts. A known method of terrorism prevention is uncovering a plot during its planning and preparation phase. Terrorist planning can be evaluated based on how actors move through space and time prior to the execution of their attack. General patterns …


Rape Myths And Consent In College-Aged Southern Students, Amy Leanne Cofer May 2014

Rape Myths And Consent In College-Aged Southern Students, Amy Leanne Cofer

Graduate Theses and Dissertations

Rape and sexual assault are problematic issues for women on college campuses. Internal and external consent play a role in understanding sexual assault because sexual assault is defined as "nonconsensual sexual activity obtained through force, threats, intoxication, or intimidation." Factors related to understanding consent may include attitudes regarding sexual assault and rape, known as rape myths, which are defined as attitudes and false statements concerning rape that are widely known and accepted, mainly served to justify male sexual aggression towards women. The southeastern United States is known for being religiously and politically conservative, where gender roles are intertwined with a …


21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring May 2014

21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring

Graduate Theses and Dissertations

This study examines differences between users and nonusers of information communication technologies (ICTs) within the pre-incident planning processes for domestic terrorist movements operating within the United States. In addition, this study is the first quantitative exploration of the prevalence, types, and purposes of ICT use within terrorist movements, specifically environmental, far-right, and Islamic extremist movements. Using "officially designated" federal terrorism investigations from the American Terrorism Study (ATS), we analyzed extracted evidence of ICT usage among individuals (n =331) engaged in the pre-incident planning processes as members of terrorist movements between 1995-2011. While we find significant differences in terrorist ICT use …


Hot Crime: Economic Analysis And Insight Into The Relationship Between A City's Latitude And Its Rate Of Violence, Erin K. Piepenbrok May 2014

Hot Crime: Economic Analysis And Insight Into The Relationship Between A City's Latitude And Its Rate Of Violence, Erin K. Piepenbrok

Economics Undergraduate Honors Theses

Every day in America, a case of violent crime makes headlines across the television, newspapers, websites, and social media. These tragedies deeply affect those directly involved and the communities in which the crimes take place. Not only are individuals physically and mentally affected by violent crime, but communities and cities suffer an economic loss from rising violent crime rates. Reducing the current rates of violent crime (robbery, assaults, rapes, and murders) can reduce costs for cities and taxpayers, while ultimately improving the quality of life for Americans. Research into what affects violent crime rates lead to discoveries that unemployment, gun …